Libd: Scalable and precise third-party library detection in android markets M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017 | 186 | 2017 |
Understanding android obfuscation techniques: A large-scale investigation in the wild S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang Security and privacy in communication networks: 14th international …, 2018 | 157 | 2018 |
Porous carbon nitride thin strip: precise carbon doping regulating delocalized π‐electron induces elevated photocatalytic hydrogen evolution Q Li, L Zhang, J Liu, J Zhou, Y Jiao, X Xiao, C Zhao, Y Zhou, S Ye, B Jiang, ... Small 17 (11), 2006622, 2021 | 103 | 2021 |
Three-dimensional assemblies of carbon nitride tubes as nanoreactors for enhanced photocatalytic hydrogen production C Zhao, Q Li, Y Xie, L Zhang, X Xiao, D Wang, Y Jiao, CAH Price, B Jiang, ... Journal of Materials Chemistry A 8 (1), 305-312, 2020 | 88 | 2020 |
Nitrogen vacancy-rich porous carbon nitride nanosheets for efficient photocatalytic H2O2 production C Zhao, C Shi, Q Li, X Wang, G Zeng, S Ye, B Jiang, J Liu Materials Today Energy 24, 100926, 2022 | 49 | 2022 |
Towards network anomaly detection using graph embedding Q Xiao, J Liu, Q Wang, Z Jiang, X Wang, Y Yao Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020 | 47 | 2020 |
A session-packets-based encrypted traffic classification using capsule neural networks S Cui, B Jiang, Z Cai, Z Lu, S Liu, J Liu 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 46 | 2019 |
Postconditioned symbolic execution Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao 2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015 | 44 | 2015 |
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network F Ren, Z Jiang, X Wang, J Liu Cybersecurity 3 (1), 4, 2020 | 43 | 2020 |
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 41 | 2017 |
A deployable sampling strategy for data race detection Y Cai, J Zhang, L Cao, J Liu Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 40 | 2016 |
Eliminating path redundancy via postconditioned symbolic execution Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao IEEE Transactions on Software Engineering 44 (1), 25-43, 2017 | 38 | 2017 |
Nonmuscle myosin heavy chain IIA facilitates SARS-CoV-2 infection in human pulmonary cells J Chen, J Fan, Z Chen, M Zhang, H Peng, J Liu, L Ding, M Liu, C Zhao, ... Proceedings of the National Academy of Sciences 118 (50), e2111011118, 2021 | 32 | 2021 |
A synergistic analysis method for explaining failed regression tests Q Yi, Z Yang, J Liu, C Zhao, C Wang 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015 | 29 | 2015 |
Machine learning prediction analysis using IoT for smart farming A Rehman, J Liu, L Keqiu, A Mateen, MQ Yasin Int. J 8 (9), 1-6, 2020 | 23 | 2020 |
MAAC: Novel alert correlation method to detect multi-step attack X Wang, X Gong, L Yu, J Liu 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 21 | 2021 |
A bi-directional LSTM model with attention for malicious URL detection F Ren, Z Jiang, J Liu 2019 IEEE 4th Advanced Information Technology, Electronic and Automation …, 2019 | 20 | 2019 |
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang, N Li Cybersecurity 5 (1), 8, 2022 | 19 | 2022 |
Program structure aware fault localization H Li, Y Liu, Z Zhang, J Liu Proceedings of the International Workshop on Innovative Software Development …, 2014 | 19 | 2014 |
Large-scale third-party library detection in android markets M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018 | 17 | 2018 |